CN103701779A - Method and device for accessing website for second time and firewall equipment - Google Patents

Method and device for accessing website for second time and firewall equipment Download PDF

Info

Publication number
CN103701779A
CN103701779A CN201310685307.5A CN201310685307A CN103701779A CN 103701779 A CN103701779 A CN 103701779A CN 201310685307 A CN201310685307 A CN 201310685307A CN 103701779 A CN103701779 A CN 103701779A
Authority
CN
China
Prior art keywords
url
website
address
value
time information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310685307.5A
Other languages
Chinese (zh)
Other versions
CN103701779B (en
Inventor
周培和
叶鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nsfocus Technologies Inc
Nsfocus Technologies Group Co Ltd
Original Assignee
NSFOCUS Information Technology Co Ltd
Beijing NSFocus Information Security Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NSFOCUS Information Technology Co Ltd, Beijing NSFocus Information Security Technology Co Ltd filed Critical NSFOCUS Information Technology Co Ltd
Priority to CN201310685307.5A priority Critical patent/CN103701779B/en
Publication of CN103701779A publication Critical patent/CN103701779A/en
Application granted granted Critical
Publication of CN103701779B publication Critical patent/CN103701779B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a method and a device for accessing a website for a second time and firewall equipment. The method comprises the following steps: A, receiving a first HTTP (Hyper Text Transport Protocol) request message carrying the IP (Internet Protocol) address, a URL (Uniform Resource Locator) and first generation time information of a client; B, judging whether the first HTTP request message is trustable or not, and if so, executing F; otherwise, executing C; C, detecting whether a website which corresponds to the URL is a malicious website or not, if so, executing D, and otherwise, executing F; D, transmitting an HTTP response message to the client; E, receiving a second HTTP request message carrying ID information, an IP address, a URL and second generation time information to generate a table entry in a trustable access chain table, instructing the client to request to access the website which corresponds to the URL once again, and executing A; F, transmitting the first HTTP request message to the website which corresponds to the URL. By adopting the scheme, a special technician does not need to be configured, and high maintainability is achieved.

Description

A kind of method of secondary access websites, device and firewall box
Technical field
The present invention relates to communication technical field, espespecially a kind of method of secondary access websites, device and firewall box.
Background technology
Along with the development of the Internet (Internet) technology, diverse network security incident takes place frequently.From technical standpoint, attack on Internet gets more and more and is undertaken by World Wide Web (WWW) (Web), the today being becoming increasingly rampant in malicious websites such as fishing, extension horses especially, to existing the website of potential safety hazard to conduct interviews, be easy to cause virus, wooden horse to spread unchecked, cause various important informations to be revealed, thereby be necessary detect and defend for website.
Can, by configuration website prestige security strategy, stop user to conduct interviews to malicious websites, thereby strengthen the ability of resisting malicious websites.Detailed process is, when user wants access websites, can on browser, input URL(uniform resource locator) (Uniform Resource Locator, URL), URL(also can be called web page address, network address) be the address of the resource of the upper standard of Internet, firewall box can be used website prestige security strategy to detect URL, if this URL detected, has security risk, directly stops user's access; Otherwise, allow user access.If user's access request is prevented from, webpage slowly fails to open and without any prompting, user can constantly refresh, and so just causes unnecessary time waste, and reduces user and experience.
In order to address the above problem, can after stoping user's access, be redirected to another website, user just can be notified in time under access is prevented from situation like this, when user wishes to continue this website of access, can only process by the methods such as white list are set, but white list is set, need professional and technical personnel to reconfigure website prestige security strategy, layoutprocedure is very loaded down with trivial details, maintainable poor.
Summary of the invention
The embodiment of the present invention provides a kind of method, device and firewall box of secondary access websites, in order to solve existing secondary, visits loaded down with trivial details, the maintainable poor problem of the layoutprocedure existing in the method for website.
Therefore, according to the embodiment of the present invention, provide a kind of method of secondary access websites, comprising:
A, firewall box receive the first HTML (Hypertext Markup Language) HTTP request message of Internet protocol IP address, uniform resource position mark URL and the first rise time information of carrying client;
B, according to described IP address, described URL, described the first rise time information and credible access chained list, judge that whether a described HTTP request message is credible, if so, carry out F; Otherwise, carry out C;
C, detect whether the website that described URL is corresponding is malicious websites, if malicious websites is carried out D; Otherwise, carry out F;
D, after carrying the sign id information of described firewall box and the http response message of described URL, send to described client, for reminding, website corresponding to URL described in described client is malicious websites;
E, receive after the 2nd HTTP request message that carries described id information, described IP address, described URL and the second rise time information, according to the list item in credible access chained list described in described IP address, described URL and described the second rise time Information generation, and indicate described client website corresponding to URL described in request access again, carry out A;
F, a described HTTP request message is sent to the website that described URL is corresponding.
Concrete, according to described IP address, described URL, described the first rise time information and credible access chained list, judge that whether a described HTTP request message is credible, specifically comprise:
Search the list item that whether comprises described IP address and described URL in described credible access chained list; Or, according to described URL and described IP address computation key Key, using described the first rise time information as value Value, obtain Key/Value couple, search in described credible access chained list whether comprise the list item that described Key/Value is right;
If find, whether the difference of the temporal information in more described the first rise time information and the list item that finds surpasses set point, if surpass, determines that a described HTTP request message is insincere; If do not surpass, determine that a described HTTP request message is credible;
If do not find, determine that a described HTTP request message is insincere.
Concrete, detect whether the website that described URL is corresponding is malicious websites, specifically comprise:
Compared in the prestige storehouse, website of described URL and configuration;
If described URL is present in prestige storehouse, described website, the website that described URL is corresponding is malicious websites;
If described URL is not present in prestige storehouse, described website, the website that described URL is corresponding is not malicious websites.
Concrete, the list item according in credible access chained list described in described IP address, described URL and described the second rise time Information generation, specifically comprises:
According to described URL and described IP address computation key Key, using described the second rise time information as value Value, obtain Key/Value couple, using described Key/Value to the list item in described credible access chained list; Or
Using described IP address, described URL and the list item of described the second rise time information in described credible access chained list.
Concrete, according to described URL and described IP address computation key Key, specifically comprise:
Described URL be take to 4 characters after one group of decimalize numerical value, the decimal system numerical value after converting is added, obtain first and value;
By described IP address decimalize numerical value, be added with value with described first, obtain Key.
The embodiment of the present invention also provides a kind of device of secondary access websites, it is characterized in that, comprising:
Receiving element, carries the first HTML (Hypertext Markup Language) HTTP request message of Internet protocol IP address, uniform resource position mark URL and the first rise time information of client for receiving;
Judging unit, for judging that according to described IP address, described URL, described the first rise time information and credible access chained list whether a described HTTP request message is credible, if so, turns to retransmission unit; Otherwise, turn to detecting unit;
Described detecting unit, whether the website corresponding for detection of described URL is malicious websites, if malicious websites turns to transmitting element; Otherwise, turn to described retransmission unit;
Described transmitting element, for send to described client after carrying the sign id information of firewall box at self place and the http response message of described URL, for reminding, website corresponding to URL described in described client is malicious websites;
Generation unit, for receiving after the 2nd HTTP request message that carries described id information, described IP address, described URL and the second rise time information, according to the list item in credible access chained list described in described IP address, described URL and described the second rise time Information generation, and indicate described client website corresponding to URL described in request access again, turn to described receiving element;
Described retransmission unit, for sending to by a described HTTP request message website that described URL is corresponding.
Concrete, described judging unit, specifically for:
Search the list item that whether comprises described IP address and described URL in described credible access chained list; Or, according to described URL and described IP address computation key Key, using described the first rise time information as value Value, obtain Key/Value couple, search in described credible access chained list whether comprise the list item that described Key/Value is right;
If find, whether the difference of the temporal information in more described the first rise time information and the list item that finds surpasses set point, if surpass, determines that a described HTTP request message is insincere; If do not surpass, determine that a described HTTP request message is credible;
If do not find, determine that a described HTTP request message is insincere.
Concrete, described detecting unit, specifically for:
Compared in the prestige storehouse, website of described URL and configuration;
If described URL is present in prestige storehouse, described website, the website that described URL is corresponding is malicious websites;
If described URL is not present in prestige storehouse, described website, the website that described URL is corresponding is not malicious websites.
Concrete, described generation unit, specifically for:
According to described URL and described IP address computation key Key, using described the second rise time information as value Value, obtain Key/Value couple, using described Key/Value to the list item in described credible access chained list; Or
Using described IP address, described URL and the list item of described the second rise time information in described credible access chained list.
Concrete, described generation unit, specifically for:
Described URL be take to 4 characters after one group of decimalize numerical value, the decimal system numerical value after converting is added, obtain first and value;
By described IP address decimalize numerical value, be added with value with described first, obtain Key.
The embodiment of the present invention also provides a kind of firewall box, comprises the device of above-mentioned secondary access websites.
The Website access method that the embodiment of the present invention provides, device and firewall box, can be by the malicious websites notice client detecting, when client wants continues access, URL corresponding to this website, IP address and the rise time information of client can be added in credible access chained list, thereby just can realize client secondary access websites, this scheme is without special technical staff's configuration, maintainable good.
Accompanying drawing explanation
Fig. 1 is the flow chart of the method for secondary access websites in the embodiment of the present invention;
Fig. 2 is the structural representation of the device of secondary access websites in the embodiment of the present invention.
Embodiment
For existing secondary, visit loaded down with trivial details, the maintainable poor problem of the layoutprocedure existing in the method for website, the embodiment of the present invention provides a kind of method of secondary access websites, the executive agent of the method is firewall box, and flow process as shown in Figure 1, performs step as follows:
S10: the first HTML (Hypertext Markup Language) (Hyper Text Transport Protocol, the HTTP) request message that receives Internet protocol (Internet Protocol, IP) address, URL and the first rise time information of carrying client.
When user wants to access some websites, can send by client a HTTP request message of IP address, URL and the first rise time information of carrying client, the first rise time information is the time of producing a HTTP request message.
S11: judge that according to IP address, URL, the first rise time information and credible access chained list whether a HTTP request message is credible, if so, carry out S15; Otherwise, carry out S12.
S12: whether detect website corresponding to URL is malicious websites, if malicious websites is carried out S13; Otherwise, S15.
If a HTTP request message is insincere, detect whether the website that URL is corresponding is malicious websites.
S13: sending to client after carrying sign (Identification, the ID) information of firewall box and the http response message of URL, is malicious websites for reminding the website that client URL is corresponding.
If malicious websites, and http response message is sent to notice client, what prompting client-requested was accessed is malicious websites, suppose that URL corresponding to website that client will be accessed is http://www.example.com/, the id information of firewall box is designated as devicestring, id information and the URL of the firewall box carrying in http response message can be used as hyperlink, are designated as http://www.example.com/ devicestring.
The id information of firewall box is according to hard disk sequence number and central processing unit (Central Processing Unit, CPU) sequence number generates, hard disk sequence number be firewall box while dispatching from the factory for difference equipment arranges, be unique and read-only, CPU sequence number is also unique and read-only.Therefore, hard disk sequence number and CPU sequence number can be generated to the unique identification of firewall box by md5 encryption algorithm.
S14: receive after the 2nd HTTP request message that carries id information, IP address, URL and the second rise time information, according to the list item in IP address, URL and the credible access chained list of the second rise time Information generation, and indicate client website corresponding to request access URL again, carry out S10.
When client is after http response message, what at this moment in client, show is security alarm webpage, if user wishes to continue this website of access, just can click the hyperlink in http response message, thereby send out the 2nd HTTP request message that carries id information, IP address, URL and the second rise time information.
Firewall box receives after the second http response message, know that client wants continues access website corresponding to this URL, just can be added in credible access chained list according to IP address, URL and the second rise time Information generation list item, and indicating user website corresponding to this URL of request access again.
S15: a HTTP request message sends to the website that URL is corresponding.
In this scheme, can be by the malicious websites notice client detecting, when client wants continues access, URL corresponding to this website, IP address and the rise time information of client can be added in credible access chained list, thereby just can realize client secondary access websites, this scheme is without special technical staff's configuration, maintainable good.
Concrete, in above-mentioned S10, according to IP address, URL, the first rise time information and credible access chained list, judge that whether a HTTP request message is credible, specifically comprise:
Search in credible access chained list and whether comprise; Or, according to URL and IP address computation key Key, using the first rise time information as value Value, obtain Key/Value couple, search in credible access chained list whether comprise the list item that Key/Value is right;
If find, relatively whether the difference of the temporal information in the first rise time information and the list item finding surpasses set point, if surpass, determines that a HTTP request message is insincere; If do not surpass, determine that a HTTP request message is credible;
If do not find, determine that a HTTP request message is insincere.
Can search list item according to the create-rule of the list item in credible access chained list, if the direct preservation of its list item is IP address, URL and temporal information, directly search; If that its list item is preserved is Key/Value couple, first according to a HTTP request message, calculates Key/Value couple, and then search.
The one HTTP request message has the term of validity, can identify by set point the size of the term of validity, if surpass the term of validity, even if comprise the right list item in IP address and URL or Key/Value in credible access chained list, a HTTP request message is still incredible.Set point can be set according to actual needs, for example 3,4,5 minutes etc.
Concrete, whether website corresponding to detection URL in above-mentioned S12 is malicious websites, specifically comprises:
Compared in the prestige storehouse, website of URL and configuration;
If URL is present in prestige storehouse, website, the website that URL is corresponding is malicious websites;
If URL is not present in prestige storehouse, website, the website that URL is corresponding is not malicious websites.
Can prestige storehouse, pre-configured website, in prestige storehouse, website, preserve URL corresponding to malicious websites, when whether detection website corresponding to URL is malicious websites, just this URL and prestige storehouse, website can be compared, website corresponding to URL that is only present in prestige storehouse, website is only malicious websites, and website corresponding to URL that is not present in prestige storehouse, website is security website.
Concrete, in above-mentioned 13 according to the list item in IP address, URL and the credible access chained list of the second rise time Information generation, specifically comprise:
According to URL and IP address computation key Key, using the second rise time information as value Value, obtain Key/Value couple, using Key/Value to the list item in credible access chained list; Or
Using IP address, URL and the list item of the second rise time information in credible access chained list.
Concrete, above-mentioned according to URL and IP address computation key Key, specifically comprise:
URL be take to 4 characters after one group of decimalize numerical value, the decimal system numerical value after converting is added, obtain first and value;
By IP address decimalize numerical value, be added with value with first, obtain Key.
Based on same inventive concept, the embodiment of the present invention provides a kind of device of secondary access websites, and this device can be arranged in firewall box, and structure as shown in Figure 2, comprising:
Receiving element 20, carries a HTTP request message of IP address, URL and the first rise time information of client for receiving.
Judging unit 21, for judging that according to IP address, URL, the first rise time information and credible access chained list whether a HTTP request message is credible, if so, turns to retransmission unit 25; Otherwise, turn to detecting unit 22.
Detecting unit 22, whether the website corresponding for detection of URL is malicious websites, if malicious websites turns to transmitting element 23; Otherwise, turn to retransmission unit 25.
Transmitting element 23, for send to client after carrying the sign id information of firewall box at self place and the http response message of URL, is malicious websites for reminding the website that client URL is corresponding.
Generation unit 24, for receiving after the 2nd HTTP request message that carries id information, IP address, URL and the second rise time information, according to the list item in IP address, URL and the credible access chained list of the second rise time Information generation, and indicate client website corresponding to request access URL again, turn to receiving element 20.
Retransmission unit 25, for sending to by a HTTP request message website that URL is corresponding.
Concrete, above-mentioned judging unit 21, specifically for:
Search the list item that whether comprises IP address and URL in credible access chained list; Or, according to URL and IP address computation key Key, using the first rise time information as value Value, obtain Key/Value couple, search in credible access chained list whether comprise the list item that Key/Value is right;
If find, relatively whether the difference of the temporal information in the first rise time information and the list item finding surpasses set point, if surpass, determines that a HTTP request message is insincere; If do not surpass, determine that a HTTP request message is credible;
If do not find, determine that a HTTP request message is insincere.
Concrete, above-mentioned detecting unit 22, specifically for:
Compared in the prestige storehouse, website of URL and configuration;
If URL is present in prestige storehouse, website, the website that URL is corresponding is malicious websites;
If URL is not present in prestige storehouse, website, the website that URL is corresponding is not malicious websites.
Concrete, above-mentioned generation unit 24, specifically for:
According to URL and IP address computation key Key, using the second rise time information as value Value, obtain Key/Value couple, using Key/Value to the list item in credible access chained list; Or
Using IP address, URL and the list item of the second rise time information in credible access chained list.
Concrete, above-mentioned generation unit 24, specifically for:
URL be take to 4 characters after one group of decimalize numerical value, the decimal system numerical value after converting is added, obtain first and value;
By IP address decimalize numerical value, be added with value with first, obtain Key.
The present invention is with reference to describing according to flow chart and/or the block diagram of the method for the embodiment of the present invention, equipment (system) and computer program.Should understand can be in computer program instructions realization flow figure and/or block diagram each flow process and/or the flow process in square frame and flow chart and/or block diagram and/or the combination of square frame.Can provide these computer program instructions to the processor of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing device to produce a machine, the instruction of carrying out by the processor of computer or other programmable data processing device is produced for realizing the device in the function of flow process of flow chart or a plurality of flow process and/or square frame of block diagram or a plurality of square frame appointments.
These computer program instructions also can be stored in energy vectoring computer or the computer-readable memory of other programmable data processing device with ad hoc fashion work, the instruction that makes to be stored in this computer-readable memory produces the manufacture that comprises command device, and this command device is realized the function of appointment in flow process of flow chart or a plurality of flow process and/or square frame of block diagram or a plurality of square frame.
These computer program instructions also can be loaded in computer or other programmable data processing device, make to carry out sequence of operations step to produce computer implemented processing on computer or other programmable devices, thereby the instruction of carrying out is provided for realizing the step of the function of appointment in flow process of flow chart or a plurality of flow process and/or square frame of block diagram or a plurality of square frame on computer or other programmable devices.
Although described optional embodiment of the present invention, once those skilled in the art obtain the basic creative concept of cicada, can make other change and modification to these embodiment.So claims are intended to be interpreted as all changes and the modification that comprise optional embodiment and fall into the scope of the invention.
Obviously, those skilled in the art can carry out various changes and modification and not depart from the spirit and scope of the embodiment of the present invention the embodiment of the present invention.Like this, if within these of the embodiment of the present invention are revised and modification belongs to the scope of the claims in the present invention and equivalent technologies thereof, the present invention is also intended to comprise these changes and modification interior.

Claims (11)

1. a method for secondary access websites, is characterized in that, comprising:
A, firewall box receive the first HTML (Hypertext Markup Language) HTTP request message of Internet protocol IP address, uniform resource position mark URL and the first rise time information of carrying client;
B, according to described IP address, described URL, described the first rise time information and credible access chained list, judge that whether a described HTTP request message is credible, if so, carry out F; Otherwise, carry out C;
C, detect whether the website that described URL is corresponding is malicious websites, if malicious websites is carried out D; Otherwise, carry out F;
D, after carrying the sign id information of described firewall box and the http response message of described URL, send to described client, for reminding, website corresponding to URL described in described client is malicious websites;
E, receive after the 2nd HTTP request message that carries described id information, described IP address, described URL and the second rise time information, according to the list item in credible access chained list described in described IP address, described URL and described the second rise time Information generation, and indicate described client website corresponding to URL described in request access again, carry out A;
F, a described HTTP request message is sent to the website that described URL is corresponding.
2. the method for claim 1, is characterized in that, according to described IP address, described URL, described the first rise time information and credible access chained list, judges that whether a described HTTP request message is credible, specifically comprises:
Search the list item that whether comprises described IP address and described URL in described credible access chained list; Or, according to described URL and described IP address computation key Key, using described the first rise time information as value Value, obtain Key/Value couple, search in described credible access chained list whether comprise the list item that described Key/Value is right;
If find, whether the difference of the temporal information in more described the first rise time information and the list item that finds surpasses set point, if surpass, determines that a described HTTP request message is insincere; If do not surpass, determine that a described HTTP request message is credible;
If do not find, determine that a described HTTP request message is insincere.
3. the method for claim 1, is characterized in that, detects whether the website that described URL is corresponding is malicious websites, specifically comprises:
Compared in the prestige storehouse, website of described URL and configuration;
If described URL is present in prestige storehouse, described website, the website that described URL is corresponding is malicious websites;
If described URL is not present in prestige storehouse, described website, the website that described URL is corresponding is not malicious websites.
4. the method for claim 1, is characterized in that, the list item according in credible access chained list described in described IP address, described URL and described the second rise time Information generation, specifically comprises:
According to described URL and described IP address computation key Key, using described the second rise time information as value Value, obtain Key/Value couple, using described Key/Value to the list item in described credible access chained list; Or
Using described IP address, described URL and the list item of described the second rise time information in described credible access chained list.
5. method as claimed in claim 4, is characterized in that, according to described URL and described IP address computation key Key, specifically comprises:
Described URL be take to 4 characters after one group of decimalize numerical value, the decimal system numerical value after converting is added, obtain first and value;
By described IP address decimalize numerical value, be added with value with described first, obtain Key.
6. a device for secondary access websites, is characterized in that, comprising:
Receiving element, carries the first HTML (Hypertext Markup Language) HTTP request message of Internet protocol IP address, uniform resource position mark URL and the first rise time information of client for receiving;
Judging unit, for judging that according to described IP address, described URL, described the first rise time information and credible access chained list whether a described HTTP request message is credible, if so, turns to retransmission unit; Otherwise, turn to detecting unit;
Described detecting unit, whether the website corresponding for detection of described URL is malicious websites, if malicious websites turns to transmitting element; Otherwise, turn to described retransmission unit;
Described transmitting element, for send to described client after carrying the sign id information of firewall box at self place and the http response message of described URL, for reminding, website corresponding to URL described in described client is malicious websites;
Generation unit, for receiving after the 2nd HTTP request message that carries described id information, described IP address, described URL and the second rise time information, according to the list item in credible access chained list described in described IP address, described URL and described the second rise time Information generation, and indicate described client website corresponding to URL described in request access again, turn to described receiving element;
Described retransmission unit, for sending to by a described HTTP request message website that described URL is corresponding.
7. device as claimed in claim 6, is characterized in that, described judging unit, specifically for:
Search the list item that whether comprises described IP address and described URL in described credible access chained list; Or, according to described URL and described IP address computation key Key, using described the first rise time information as value Value, obtain Key/Value couple, search in described credible access chained list whether comprise the list item that described Key/Value is right;
If find, whether the difference of the temporal information in more described the first rise time information and the list item that finds surpasses set point, if surpass, determines that a described HTTP request message is insincere; If do not surpass, determine that a described HTTP request message is credible;
If do not find, determine that a described HTTP request message is insincere.
8. device as claimed in claim 6, is characterized in that, described detecting unit, specifically for:
Compared in the prestige storehouse, website of described URL and configuration;
If described URL is present in prestige storehouse, described website, the website that described URL is corresponding is malicious websites;
If described URL is not present in prestige storehouse, described website, the website that described URL is corresponding is not malicious websites.
9. device as claimed in claim 6, is characterized in that, described generation unit, specifically for:
According to described URL and described IP address computation key Key, using described the second rise time information as value Value, obtain Key/Value couple, using described Key/Value to the list item in described credible access chained list; Or
Using described IP address, described URL and the list item of described the second rise time information in described credible access chained list.
10. device as claimed in claim 9, is characterized in that, described generation unit, specifically for:
Described URL be take to 4 characters after one group of decimalize numerical value, the decimal system numerical value after converting is added, obtain first and value;
By described IP address decimalize numerical value, be added with value with described first, obtain Key.
11. 1 kinds of firewall boxs, is characterized in that, comprise the device of the secondary access websites as described in as arbitrary in claim 6-10.
CN201310685307.5A 2013-12-13 2013-12-13 Method and device for accessing website for second time and firewall equipment Active CN103701779B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310685307.5A CN103701779B (en) 2013-12-13 2013-12-13 Method and device for accessing website for second time and firewall equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310685307.5A CN103701779B (en) 2013-12-13 2013-12-13 Method and device for accessing website for second time and firewall equipment

Publications (2)

Publication Number Publication Date
CN103701779A true CN103701779A (en) 2014-04-02
CN103701779B CN103701779B (en) 2017-02-22

Family

ID=50363176

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310685307.5A Active CN103701779B (en) 2013-12-13 2013-12-13 Method and device for accessing website for second time and firewall equipment

Country Status (1)

Country Link
CN (1) CN103701779B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104766014A (en) * 2015-04-30 2015-07-08 安一恒通(北京)科技有限公司 Method and system used for detecting malicious website
CN106603575A (en) * 2017-02-06 2017-04-26 恒安嘉新(北京)科技有限公司 Network-side-based active detection and real-time prompting method, apparatus, and system for internet-surfing security
WO2017167208A1 (en) * 2016-03-29 2017-10-05 腾讯科技(深圳)有限公司 Method and apparatus for recognizing malicious website, and computer storage medium
CN107836101A (en) * 2015-06-27 2018-03-23 迈克菲有限责任公司 Goodwill for URL
CN108768934A (en) * 2018-04-11 2018-11-06 北京立思辰新技术有限公司 Rogue program issues detection method, device and medium
CN109995889A (en) * 2018-01-02 2019-07-09 中国移动通信有限公司研究院 Update method, device, gateway and the storage medium of mapping table
CN110086754A (en) * 2018-01-26 2019-08-02 北京金山云网络技术有限公司 A kind of resource screen method, device, electronic equipment and readable storage medium storing program for executing

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016173200A1 (en) * 2015-04-30 2016-11-03 安一恒通(北京)科技有限公司 Malicious website detection method and system
US10567407B2 (en) 2015-04-30 2020-02-18 Iyuntian Co., Ltd. Method and system for detecting malicious web addresses
CN104766014A (en) * 2015-04-30 2015-07-08 安一恒通(北京)科技有限公司 Method and system used for detecting malicious website
CN104766014B (en) * 2015-04-30 2017-12-01 安一恒通(北京)科技有限公司 For detecting the method and system of malice network address
CN107836101A (en) * 2015-06-27 2018-03-23 迈克菲有限责任公司 Goodwill for URL
WO2017167208A1 (en) * 2016-03-29 2017-10-05 腾讯科技(深圳)有限公司 Method and apparatus for recognizing malicious website, and computer storage medium
US10834105B2 (en) 2016-03-29 2020-11-10 Tencent Technology (Shenzhen) Company Limited Method and apparatus for identifying malicious website, and computer storage medium
CN106603575A (en) * 2017-02-06 2017-04-26 恒安嘉新(北京)科技有限公司 Network-side-based active detection and real-time prompting method, apparatus, and system for internet-surfing security
CN106603575B (en) * 2017-02-06 2020-05-26 恒安嘉新(北京)科技股份公司 Network side-based active internet surfing safety detection and real-time reminding method, device and system
CN109995889A (en) * 2018-01-02 2019-07-09 中国移动通信有限公司研究院 Update method, device, gateway and the storage medium of mapping table
CN109995889B (en) * 2018-01-02 2022-02-25 中国移动通信有限公司研究院 Method and device for updating mapping relation table, gateway equipment and storage medium
CN110086754A (en) * 2018-01-26 2019-08-02 北京金山云网络技术有限公司 A kind of resource screen method, device, electronic equipment and readable storage medium storing program for executing
CN108768934A (en) * 2018-04-11 2018-11-06 北京立思辰新技术有限公司 Rogue program issues detection method, device and medium
CN108768934B (en) * 2018-04-11 2021-09-07 北京立思辰新技术有限公司 Malicious program release detection method, device and medium

Also Published As

Publication number Publication date
CN103701779B (en) 2017-02-22

Similar Documents

Publication Publication Date Title
CN109040316B (en) HTTP service processing method and device
CN103701779A (en) Method and device for accessing website for second time and firewall equipment
US10182324B2 (en) Contextual deep linking of applications
US11886619B2 (en) Apparatus and method for securing web application server source code
WO2017084508A1 (en) Method and device for automatically burying points
KR102105636B1 (en) Installing application remotely
US10212179B2 (en) Method and system for checking security of URL for mobile terminal
US20160006760A1 (en) Detecting and preventing phishing attacks
CN103095681A (en) Loophole detection method and device
CN102724187A (en) Method and device for safety detection of universal resource locators
CN106992975B (en) Malicious website identification method and device
WO2017036059A1 (en) Method, apparatus, terminal device and system for monitoring user access behaviors
CN104767747A (en) Click jacking safety detection method and device
US8789177B1 (en) Method and system for automatically obtaining web page content in the presence of redirects
CN103118033B (en) A kind of defend user website to be tampered method and device
EP2854363B1 (en) Polluting results of vulnerability scans
US10474810B2 (en) Controlling access to web resources
JP2007193415A (en) Web content sharing system, server device, information processing terminal device, operation restriction method, and program
US10095791B2 (en) Information search method and apparatus
JP5383923B1 (en) Information processing apparatus, information processing system, information processing method, and program
WO2014101647A1 (en) Method and apparatus for installing webpage application
WO2018075695A1 (en) Host pair detection
CN110557507B (en) File transmission method and device, electronic equipment and computer readable storage medium
EP3502925B1 (en) Computer system and method for extracting dynamic content from websites
US9177074B2 (en) System and method for confirming authorship of documents

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 100089 Beijing city Haidian District Road No. 4 North wa Yitai three storey building

Patentee after: NSFOCUS Technologies Group Co.,Ltd.

Patentee after: NSFOCUS TECHNOLOGIES Inc.

Address before: 100089 Beijing city Haidian District Road No. 4 North wa Yitai three storey building

Patentee before: NSFOCUS INFORMATION TECHNOLOGY Co.,Ltd.

Patentee before: NSFOCUS TECHNOLOGIES Inc.